Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolving reconnaissance phase of Advanced Persistent Threat (APT) attacks in this informative conference talk by Talos researcher Paul Rascagneres. Delve into how APT actors are adapting their tactics to protect valuable zero-day exploits and malware frameworks. Examine various case studies illustrating the increasing complexity and importance of the reconnaissance phase, focusing on malicious documents (Microsoft Office and Hangul Word Processor) and watering hole attacks. Learn about campaigns targeting political and military organizations in the USA, Europe, and Asia. Gain insights into the techniques and obfuscation methods employed by these actors, including macro usage, JavaScript and PowerShell analysis, Flash object exploitation, and Python malware on MacOS. Discover how first-stage malware is used for reconnaissance, with a specific example targeting South Korea's public sector. Conclude with an overview of mitigation strategies for applications like Microsoft Office and Hangul Word Processor, as well as the Windows operating system, to enhance protection against the described threats.